Clients now wanted law firms to limit access to documents and dat. Firm used Kira to extract clauses from client security documents. They have multiple ways of saying limit access but impact is all similar. Clients increasingly also ask firms to purge data at the end of a matter or some other time specific.

—

How can we reconcile info sec requirements and need to share (KM). How can we leverage security investments to help KM? Security incident and event management (SIEM) systems track everything that goes on in an organization’s systems. These look for anamolous behaviors and flags them for action (by a person).

Even in encyrpted systems, someone always has the keys. These individuals are often targeted. Even without the keys, hackers can monitor cloud system traffic and draw certain inferences, even without seeing the data.

“Enclave” is a rapidly emerging concept in security. It means pulling really sensitive data off of online systems and isolating it.

Some of the security systems contribute to KM. By watching access and considering permissions and use cases, it is possible to tailor search results..

AI and KM… you can use machines to watch user behavior, for example, ratio of sent to received email or local versus remote access. This can support both security (anamoly detection) and KM requirements.

Tapping public data re entities can help with analytics

At the intersection of KM, Info Sec, and AI…

Auto clear security… lawyer about to work on a matter, the back end can tap multiple sources and validate need for access (instead of calling aroun0

Auto sanitize… entity extraction from documents helps sanitize for re-use. But context may still give away too much

Auto taxonomies…

Auto purge… use rules and/or behavior to determine when a document can be purged

Consider which side of firewall… analyze in- and out-coming traffic and assess value relative to risk

Behavioral analytics…. to manage risk

Session Description

Data Security is Required. KM is Demanded. AI is Here: Armageddon or Utopia?

When undeniable forces collide, the result can be massive destruction, or unimaginable power and beauty. Today, our clients require the highest quality of work product leveraging the composite capability of our respective firms – the KM promise of the last 20 years. Hacks like the Panamanian Papers illustrate the awesome responsibility entrusted in us to protect client and firm confidences. As if this weren’t enough, Artificial Intelligence and Advanced Analytics are coming of age… How can we harness these forces to have it all?